3. Points to be discussed
● Motivation
● Introduction
● Problem Finding
● Description
● Proposed Solution
● Conclusion
3
4. Motivation
● In the past decade, internet of things (IoT) has been a focus of research.
Security and privacy are the key issues for IoT applications, and still face
some enormous challenges. In order to facilitate this emerging domain, we
in brief review the research progress of IoT, and pay attention to the
security. By means of deeply analyzing the security architecture and
features, the security requirements are given. On the basis of these, we
discuss the an encryption mechanism, using a ASCII base cryptographic
algorithms and steganography, and briefly outline the challenges.
4
5. Introduction
● On a new computing environment called “Internet of Things (IoT)” or
“Smart Object” networks, a lot of constrained devices are connected to the
Internet. The devices interact with each other through the network and
provide new experience to us. In order to enjoy this new environment,
security of constrained end nodes is important. If one of the nodes were
compromised, the network might be suffered seriously. However, it is not
easy to implement sufficient cryptographic functions on constrained
devices due to the limitation of their resources.
5
6. Problem Finding
● The Internet of Things (IoT), an emerging global Internet-based technical
architecture facilitating the exchange of information, goods and services
in the internet world has an impact on the security and privacy of the
involved stakeholders. Only an ASCII value based data encryption
algorithm is not enough for IoT device. If we want to secure our enhanced
data over internet then we have to use an additional process along with
ASCII value based encryption algorithm.
6
9. ASCII Value Base Encryption Algorithm
● This algorithm is used to encrypt data by using ASCII values of the data to be encrypted.
The secret key used will be modifying to another string and that modified string is used to
encrypt or decrypt the data. So, it can be said that it is a kind of symmetric encryption
algorithm because it uses same key for both encryption and decryption but by slightly
modifying it. This algorithm operates only when the length of input and length of key are
same.
9
10. Description
● 1) Get the ASCII values of each character of input string i.e. plain text and store it in an ASCII
content array.
Input n e h a
ASCII Content 113 101 104 97
● 2) Find out the minimum value mincontent from the asciicontent array. Eg.:-Mincontent = 97
● 3) Now perform the modulus operation on each asciicontent value as follows i.e. ASCIIContent[i]
%min and save the resultants in modcontent array where the value of I ranges upto the length
of input.
Input n e h a
ASCIIContent 110 101 104 97
modcontent 13 4 7 0
10
11. ● 4) Now perform the same operation on the content key
Input n e h
a
ASCIIContent 110 101 104 97
modcontent 13 4 7 0
Key a b c
d
ASCIIkey 97 98 99
100
modkey 0 1 2
3
11
12. ● 5) Take the binary values of each value of modkey.
Input n e h
a
ASCIIContent 110 101 104
97
modcontent 13 4 7
0
Key a b c
d
ASCIIkey 97 98 99
100
12
13. ● 6) Perform the right circular shifts of binary values (n time where n is the length
of input)
Right circular shift 1 1000 0000 1001
0001
Right circular shift 2 1100 0000 0100
1000
Right circular shift 3 0110 0000 0010
0100
Right circular shift 4 0011 0000 0001
0010
Now after circular shifting,
13
14. ● 7) Now add min value to each ASCII value of each character of encrypt key after
shifting. So, final encrypt
Input n e h
a
ASCIIContent 110 101 104 97
modcontent 13 4 7 0
Key a b c
d
ASCIIkey 97 98 99
100
modkey 0 1 2 3
binary 0000 0001 0010 0011
After shifting 3 0 1 2
Adding min 100 97 98 99
Encrypt key d a b c
14
15. ● 8) Now to encrypt the original data (input) or plaintext to generate
ciphertext, add each mod content value to the ascii values of final
encrypt key.
Input n e
h a
ASCIIContent 110 101
104 97
modcontent 13 4
7 0
Key a b
c d
ASCIIkey 97 98
99 100
modkey 0 1
2 3
binary 0000 0001 0010
0011
Encrypt key after shifting 3 0 1
2
15
16. Algorithm to perform Decryption
● Following steps are performed to decrypt the cipher text:-
● 1) Take ciphertext and find out the minimum from ASCII values of each character of
cipher text.
Ciphertext q e i
c
Ascii Cipher 113 101 105 99
Mincipher is:- 99
16
17. ● 2) Now Perform the subtraction of ascii values of final encrypt key from
asciicipher
Cipher q e
i c
ASCIICipher 113 101 105 99
asciifinalencrypt 100 97 98
99
difference 13 4
7 0
17
18. ● 3) Add mincontent to each value of difference to generate plaintext.
Cipher q e
i c
ASCIICipher 113 101 105 99
asciifinalencrypt 100 97 98
99
difference 13 4
7 0
asciiplain 110 101 104 97
plaintext n e
h a
18
19. Proposed Solution
Steganography:
● Steganography is data hidden within data.
● Steganography is an encryption technique that can be used along with
cryptography as an extra-secure method in which to protect data.
● Steganography techniques can be applied to images, a video file or an
audio file.
● Typically, however, steganography is written in characters including hash
marking, but its usage within images is also common.
● At any rate, steganography protects from pirating copyrighted materials
as well as aiding in unauthorized viewing.
19
22. About Image
● Images are the combination of width and height.
● 800*600 = 480,000 pixel.
● 24-bit scheme that contain 3 bytes.
● With 8bits you can represent numbers in
the range 0-255.
● (2^8= 256).
● (R,G,B) = (0,0,0) means Black
● (R,G,B) = (255,255,255) means White.
22
23. MSB And LSB
● The leftmost bit is said to be the “most significant bit (MSB)” (changing a bit
on the left side will change the value greatly).
● The rightmost bit is the “least significant bit (LSB)” (changing that bit only
changes the value by 1).
23
26. How It Works
● From the above cipher text we have to hide: q e i c in steganography.
● Binary representation of this text is:
● q = 01110001 e = 01100101
● i = 01101001 c = 01100011
26
28. Reverse Steganography
● The LSBs of each pixel of stego-image is extracted.
● Every LSB should read until the target value achieve.
● If the target value reached then the execution will be terminated.
28
30. Conclusion
● Internet of Things (IoT) is a norm in the 21st century. It is getting more
important and we used it as part of our daily life. One of the major concerns
that need to look into it’s information confidentiality and privacy. The needs
for a secure and trustworthy smart environment is vital. In addition,
hackers are able to attack the network due to the existence of vulnerability
within IoT and low processing power devices, which can threaten the
privacy of the users. In this paper, a scheme is suggested based on the
image steganography along with ASCII value base Encryption Algorithm.
This Steganography algorithm secured ASCII value base encryption
algorithm more strongly.
30